The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] mutation(141hit)

61-80hit(141hit)

  • A New Construction of Permutation Arrays

    Jung Youl PARK  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E95-A No:11
      Page(s):
    1855-1861

    Let PA(n, d) be a permutation array (PA) of order n and the minimum distance d. We propose a new construction of the permutation array PA(pm, pm-1k) for a given prime number p, a positive integer k < p and a positive integer m. The resulted array has (|PA(p,k)|p(m-1)(p-k))m rows. Compared to the other constructions, the new construction gives a permutation array of far bigger size with a large minimum distance, for example, when k ≥ 2p/3. Moreover the proposed construction provides an algorithm to find the i-th row of PA (pm, pm-1k) for a given index i very simply.

  • Model-Based Mutation Testing Using Pushdown Automata

    Fevzi BELL  Mutlu BEYAZIT  Tomohiko TAKAGI  Zengo FURUKAWA  

     
    PAPER

      Vol:
    E95-D No:9
      Page(s):
    2211-2218

    A model-based mutation testing (MBMT) approach enables to perform negative testing where test cases are generated using mutant models containing intentional faults. This paper introduces an alternative MBMT framework using pushdown automata (PDA) that relate to context-free (type-2) languages. There are two key ideas in this study. One is to gain stronger representational power to capture the features whose behavior depends on previous states of software under test (SUT). The other is to make use of a relatively small test set and concentrate on suspicious parts of the SUT by using MBMT approach. Thus, the proposed framework includes (1) a novel usage of PDA for modeling SUT, (2) novel mutation operators for generating PDA mutants, (3) a novel coverage criterion, and an algorithm to generate negative test cases from mutant PDA. A case study validates the approach, and discusses its characteristics and limitations.

  • Nurse Scheduling by Cooperative GA with Effective Mutation Operator

    Makoto OHKI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E95-D No:7
      Page(s):
    1830-1838

    In this paper, we propose an effective mutation operators for Cooperative Genetic Algorithm (CGA) to be applied to a practical Nurse Scheduling Problem (NSP). The nurse scheduling is a very difficult task, because NSP is a complex combinatorial optimizing problem for which many requirements must be considered. In real hospitals, the schedule changes frequently. The changes of the shift schedule yields various problems, for example, a fall in the nursing level. We describe a technique of the reoptimization of the nurse schedule in response to a change. The conventional CGA is superior in ability for local search by means of its crossover operator, but often stagnates at the unfavorable situation because it is inferior to ability for global search. When the optimization stagnates for long generation cycle, a searching point, population in this case, would be caught in a wide local minimum area. To escape such local minimum area, small change in a population should be required. Based on such consideration, we propose a mutation operator activated depending on the optimization speed. When the optimization stagnates, in other words, when the optimization speed decreases, the mutation yields small changes in the population. Then the population is able to escape from a local minimum area by means of the mutation. However, this mutation operator requires two well-defined parameters. This means that user have to consider the value of these parameters carefully. To solve this problem, we propose a periodic mutation operator which has only one parameter to define itself. This simplified mutation operator is effective over a wide range of the parameter value.

  • A 1-Cycle 1.25 GHz Bufferless Router for 3D Network-on-Chip

    Chaochao FENG  Zhonghai LU  Axel JANTSCH  Minxuan ZHANG  

     
    LETTER-Computer System

      Vol:
    E95-D No:5
      Page(s):
    1519-1522

    In this paper, we propose a 1-cycle high-performance 3D bufferless router with a 3-stage permutation network. The proposed router utilizes the 3-stage permutation network instead of the serialized switch allocator and 77 crossbar to achieve the frequency of 1.25 GHz in TSMC 65 nm technology. Compared with the other two 3D bufferless routers, the proposed router occupies less area and consumes less power consumption. Simulation results under both synthetic and application workloads illustrate that the proposed router achieves less average packet latency than the other two 3D bufferless routers.

  • Efficient Address Generation for Permutation Polynomial Based Interleavers over Integer Rings

    Jonghoon RYU  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:1
      Page(s):
    421-424

    Permutation polynomial based interleavers over integer rings have recently received attention for their excellent channel coding performance, elegant algebraic properties and simplicity of implementation. In this letter, it is shown that permutation polynomial based interleavers of practical interest is decomposed into linear permutation polynomials. Based on this observation, it is shown that permutation polynomial based interleavers as well as their inverses can be efficiently implemented.

  • Influence of the Current-Limiting Resistance on the Arc Commutation Process Across the Gap of a Separated Arc Runner

    Ruiliang GUAN  Hongwu LIU  Nairui YIN  Yanfeng HE  Degui CHEN  

     
    PAPER

      Vol:
    E94-C No:9
      Page(s):
    1416-1421

    With measuring the arc current, arc voltage and arc images, the high-current air arc commutation process across the separated electrodes was investigated. It shows that the existence of a short stable arc in the gap may increase the current commutation time. According to the energy balance of the arc column, the conditions to maintain the short stable arc were introduced and the effects of the current limiting resistance on the current commutation process were discussed.

  • Sequential Bitwise Sanitizable Signature Schemes

    Goichiro HANAOKA  Shoichi HIROSE  Atsuko MIYAJI  Kunihiko MIYAZAKI  Bagus SANTOSO  Peng YANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    392-404

    A sanitizable signature scheme is a signature scheme which, after the signer generates a valid signature of a message, allows a specific entity (sanitizer) to modify the message for hiding several parts. Existing sanitizable signature schemes require the message to be divided into pre-defined blocks before signing so that each block can be sanitized independently. However, there are cases where the parts of the message which are needed to be sanitized can not be determined in the time of signing. Thus, it is difficult to decide the partition of the blocks in such cases. Since the length of the signature is usually proportional to the number of blocks, signing every bit independently will make the signature too long. In this paper, we propose a solution by introducing a new concept called sequential bitwise sanitizable signature schemes, where any sequence of bits of the signed document can be made sanitizable without pre-defining them, and without increasing the length of signature. We also show that a one-way permutation suffices to get a secure construction, which is theoretically interesting in its own right, since all the other existing schemes are constructed using stronger assumptions.

  • Generic Permutation Network for QC-LDPC Decoder

    Xiao PENG  Xiongxin ZHAO  Zhixiang CHEN  Fumiaki MAEHARA  Satoshi GOTO  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E93-A No:12
      Page(s):
    2551-2559

    Permutation network plays an important role in the reconfigurable QC-LDPC decoder for most modern wireless communication systems with multiple code rates and various code lengths. This paper presents the generic permutation network (GPN) for the reconfigurable QC-LDPC decoder. Compared with conventional permutation networks, this proposal could break through the input number restriction, such as power of 2 and other limited number, and optimize the network for any application in demand. Moreover, the proposed scheme could greatly reduce the latency because of less stages and efficient control signal generating algorithm. In addition, the proposed network processes the nature of high parallelism which could enable several groups of data to be cyclically shifted simultaneously. The synthesis results using the 90 nm technology demonstrate that this architecture can be implemented with the gate count of 18.3k for WiMAX standard at the frequency of 600 MHz and 10.9k for WiFi standard at the frequency of 800 MHz.

  • EPC: A Provably Secure Permutation Based Compression Function

    Nasour BAGHERI  Praveen GAURAVARAM  Majid NADERI  Babak SADEGHIYAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:10
      Page(s):
    1833-1836

    The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.

  • Improving Proximity and Diversity in Multiobjective Evolutionary Algorithms

    Chang Wook AHN  Yehoon KIM  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E93-D No:10
      Page(s):
    2879-2882

    This paper presents an approach for improving proximity and diversity in multiobjective evolutionary algorithms (MOEAs). The idea is to discover new nondominated solutions in the promising area of search space. It can be achieved by applying mutation only to the most converged and the least crowded individuals. In other words, the proximity and diversity can be improved because new nondominated solutions are found in the vicinity of the individuals highly converged and less crowded. Empirical results on multiobjective knapsack problems (MKPs) demonstrate that the proposed approach discovers a set of nondominated solutions much closer to the global Pareto front while maintaining a better distribution of the solutions.

  • A Study on Wear of Brush and Carbon Flat Commutator of DC Motor for Automotive Fuel Pump

    Koichiro SAWA  Takahiro UENO  Hidenori TANAKA  

     
    PAPER

      Vol:
    E93-C No:9
      Page(s):
    1443-1448

    In an automotive fuel pump system, a small DC motor is widely used to drive the pump and driven by a automotive battery. Recently a bio-fuel, usually a mixture of gasoline and ethanol has been used due to shortage of gasoline and environmental aspect. It affects strongly the performances of a DC motor, especially commutation phenomena, what kind of fuel is used. Therefore the authors have started to investigate the influence of ethanol on the commutation phenomena. They have been reporting the wear of brush and carbon flat commutator in gasoline and ethanol so far. In this paper commutation period, arc duration, brush and commutator wear are examined in ethanol 50-gasoline 50%. Brush wears are very small compared with the previous results. Namely in the present test a mechanical sliding wear is predominant rather than erosion by arc due to short arc duration. Further, an area eroded by arc is observed to re-appear as a sliding surface. From these results a threshold arc energy between arc erosion and mechanical sliding wear is obtained, and a wear model is proposed to explain the above wear pattern on the sliding surface.

  • A Novel Construction Method for n-Dimensional Hilbert Space-Filling Curves

    Chih-Sheng CHEN  Shen-Yi LIN  Min-Hsuan FAN  Chua-Huang HUANG  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:7
      Page(s):
    1807-1815

    We develop a novel construction method for n-dimensional Hilbert space-filling curves. The construction method includes four steps: block allocation, Gray permutation, coordinate transformation and recursive construction. We use the tensor product theory to formulate the method. An n-dimensional Hilbert space-filling curve of 2r elements on each dimension is specified as a permutation which rearranges 2rn data elements stored in the row major order as in C language or the column major order as in FORTRAN language to the order of traversing an n-dimensional Hilbert space-filling curve. The tensor product formulation of n-dimensional Hilbert space-filling curves uses stride permutation, reverse permutation, and Gray permutation. We present both recursive and iterative tensor product formulas of n-dimensional Hilbert space-filling curves. The tensor product formulas are directly translated into computer programs which can be used in various applications. The process of program generation is explained in the paper.

  • A New Model for Graph Matching and Its Algorithm

    Kai-Jie ZHENG  Ji-Gen PENG  Ke-Xue LI  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E93-D No:5
      Page(s):
    1294-1296

    Graph matching is a NP-Hard problem. In this paper, we relax the admissible set of permutation matrices and meantime incorporate a barrier function into the objective function. The resulted model is equivalent to the original model. Alternate iteration algorithm is designed to solve it. It is proven that the algorithm proposed is locally convergent. Our experimental results reveal that the proposed algorithm outperforms the algorithm in .

  • Performance Evaluation of OFDM Amplify-and-Forward Relay System with Subcarrier Permutation

    Enis KOCAN  Milica PEJANOVIC-DJURISIC  Diomidis S. MICHALOPOULOS  George K. KARAGIANNIDIS  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:5
      Page(s):
    1216-1223

    We perform error probability analysis of the uncoded OFDM fixed gain Amplify-and-Forward (AF) relaying system with subcarrier permutation (SCP). Two SCP schemes, named: the best-to-best SCP (BTB SCP) and the best-to-worst SCP (BTW SCP) are considered. Closed-form expressions for the bit error rate (BER) of the above SCP methods are derived. Numerical results manifest that these SCP schemes may outperform one another, depending on the average channel conditions of the links involved. That is, BTB SCP is better at low signal-to-noise ratio (SNR) values, while BTW SCP prevails in the medium and high SNR regime. Thus, it could be concluded that OFDM AF relaying systems may switch from the BTB SCP to BTW SCP in order to achieve optimum BER performance. Moreover, using the derived end-to-end SNR probability density functions (PDF), tight upper bounds for the ergodic capacities of both SCP schemes are obtained.

  • Permutation Network for Reconfigurable LDPC Decoder Based on Banyan Network

    Xiao PENG  Zhixiang CHEN  Xiongxin ZHAO  Fumiaki MAEHARA  Satoshi GOTO  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    270-278

    Since the structured quasi-cyclic low-density parity-check (QC-LDPC) codes for most modern wireless communication systems include multiple code rates, various block lengths, and the corresponding different sizes of submatrices in parity check matrix (PCM), the reconfigurable LDPC decoder is desirable and the permutation network is needed to accommodate any input number (IN) and shift number (SN) for cyclic shift. In this paper, we propose a novel permutation network architecture for the reconfigurable QC-LDPC decoders based on Banyan network. We prove that Banyan network has the nonblocking property for cyclic shift when the IN is power of 2, and give the control signal generating algorithm. Through introducing the bypass network, we put forward the nonblocking scheme for any IN and SN. In addition, we present the hardware design of the control signal generator, which can greatly reduce the hardware complexity and latency. The synthesis results using the TSMC 0.18 µm library demonstrate that the proposed permutation network can be implemented with the area of 0.546 mm2 and the frequency of 292 MHz.

  • Hash Functions and Information Theoretic Security

    Nasour BAGHERI  Lars R. KNUDSEN  Majid NADERI  Sφren S. THOMSEN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:12
      Page(s):
    3401-3403

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant.

  • Near-Optimal Auto-Configuration of PCID in LTE Cellular Systems

    Navrati SAXENA  Abhishek ROY  Jeong Jae WON  

     
    LETTER-Network

      Vol:
    E92-B No:10
      Page(s):
    3252-3255

    In this letter we show that the dynamic optimal PCID allocation problem in LTE systems is NP-complete. Subsequently we provide a near-optimal solution using SON which models the problem using new merge operations and explores the search space using a suitable randomized algorithmic approach. Two feasible options for dynamic auto-configuration of the system are also discussed. Simulation results point out that the approach provides near-optimal auto-configuration of PCIDs in computationally feasible time.

  • A New Approach to Weighted Graph Matching

    Kai-Jie ZHENG  Ji-Gen PENG  Shi-Hui YING  

     
    LETTER-Algorithm Theory

      Vol:
    E92-D No:8
      Page(s):
    1580-1583

    Weighted graph matching is computationally challenging due to the combinatorial nature of the set of permutations. In this paper, a new relaxation approach to weighted graph matching is proposed, by which a new matching algorithm, named alternate iteration algorithm, is designed. It is proved that the algorithm proposed is locally convergent. Experiments are presented to show the effectiveness of the proposed algorithm.

  • An Optimal Parallel Algorithm for Constructing a Spanning Tree on Circular Permutation Graphs

    Hirotoshi HONMA  Saki HONMA  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E92-D No:2
      Page(s):
    141-148

    The spanning tree problem is to find a tree that connects all the vertices of G. This problem has many applications, such as electric power systems, computer network design and circuit analysis. Klein and Stein demonstrated that a spanning tree can be found in O(log n) time with O(n+m) processors on the CRCW PRAM. In general, it is known that more efficient parallel algorithms can be developed by restricting classes of graphs. Circular permutation graphs properly contain the set of permutation graphs as a subclass and are first introduced by Rotem and Urrutia. They provided O(n2.376) time recognition algorithm. Circular permutation graphs and their models find several applications in VLSI layout. In this paper, we propose an optimal parallel algorithm for constructing a spanning tree on circular permutation graphs. It runs in O(log n) time with O(n/log n) processors on the EREW PRAM.

  • Efficient Encoding Architecture for IEEE 802.16e LDPC Codes

    Jeong Ki KIM  Hyunseuk YOO  Moon Ho LEE  

     
    LETTER-Embedded, Real-Time and Reconfigurable Systems

      Vol:
    E91-A No:12
      Page(s):
    3607-3611

    The weakness of implementation for LDPC encoder is that conventional binary Matrix Vector Multiplier has many clock cycles which lead to limited throughput. In this letter in order to construct efficient architecture, we target on IEEE 802.16e LDPC encoders. Over the standard H matrices with Circulant Permutation Matrices, we propose semi-parallel architecture by using cyclic right shift registers and exclusive-OR instead of complex Matrix Vector Multipliers. Proposed efficient encoder for IEEE 802.16e LDPC satisfies compact size and high throughput.

61-80hit(141hit)